We use cookies to improve your experience. Do you accept?

Skip to main content

Cyware Daily Threat Intelligence, January 07, 2025

shutterstock 2367870873

Daily Threat Briefing Jan 7, 2025

PhishWP, a rogue WordPress plugin, is redefining payment fraud with its ability to mimic trusted platforms. By harvesting card details, one-time passwords, and more in real time, this plugin enables sophisticated phishing attacks. Its arsenal includes browser profiling, obfuscation, and fake confirmation emails, delaying detection while users unknowingly fall victim.

Android’s January Security Bulletin underscores the urgency of patching critical vulnerabilities in devices running Android 12 to 15. With flaws enabling remote code execution without permissions, Google’s update addresses risks in System, Framework, and hardware components.

Hardware giants MediaTek, HPE, and Dell have issued patches for severe vulnerabilities in their products. MediaTek patched a critical modem flaw, Dell resolved privilege escalation vulnerabilities, and HPE addressed issues in SAN switches. 

Top Malware Reported in the Last 24 Hours

Beware of PhishWP

Cybercriminals have been found using a new WordPress plugin called PhishWP to create fake payment pages resembling trusted services like Stripe. The plugin tricks users into entering their payment details, including one-time passwords, and then sends the stolen information to attackers, often in real time. PhishWP also sends fake confirmation emails to victims to delay detection. It offers a range of advanced features, such as customizable checkout pages, 3DS code harvesting, real-time data transfer, browser profiling, fake confirmation emails, multi-language support, and obfuscation options.

Top Vulnerabilities Reported in the Last 24 Hours

Android security updates January 2025

The Android Security Bulletin for January 2025 reports critical security vulnerabilities that affect millions of devices worldwide. With the 2025-01-05 patch, Google has fixed issues in the System, Framework, Media Framework, and hardware from Qualcomm and MediaTek. The System component has critical flaws (CVE-2024-43096, CVE-2024-43770, CVE-2024-43771, CVE-2024-49747, CVE-2024-49748) that could allow remote code execution without extra permissions. Android 12 to 15 devices are highly vulnerable, and updates are strongly recommended. 

Two bugs spotted in Redis

Two vulnerabilities have been found in Redis, an in-memory database. The first vulnerability (CVE-2024-51741) allows for a denial-of-service attack, while the second (CVE-2024-46981) could lead to remote code execution. These vulnerabilities affect multiple versions of Redis and users are advised to update to the latest patched versions immediately. A temporary workaround for CVE-2024-46981 is available, but patching with the latest updates is recommended.

MediaTek, HPE, and Dell patch flaws

Hardware makers MediaTek, HPE, and Dell have issued advisories about serious vulnerabilities in their products that have been patched. MediaTek reported patches for a dozen vulnerabilities, including a critical flaw (CVE-2024-20154) in the modem of various chipsets. Dell has patched a high-severity flaw in its Update Package Framework, tracked as CVE-2025-22395, associated with local privilege escalation. Additionally, it addressed vulnerabilities linked to Apache Tomcat that could allow authentication bypass. HPE has fixed multiple flaws in third-party components of its SAN switches, including high- and medium-severity issues.

Related Threat Briefings